Name Replace Trusted Executable
Summary An adversary exploits weaknesses in privilege management or access control to replace a trusted executable with a malicious version and enable the execution of malware when that trusted executable is called.
Prerequisites
Solutions
Related Weaknesses
CWE ID Description
CWE-284 Improper Access Control
Back to Top